Browse Software
List Your Product
Loading...

About Endpoint Protector

Endpoint Protector is a compact endpoint data protection software that helps companies with data discovery, monitoring and protection based on multi-OS data loss prevention features. It also provides granular control over USB and other peripheral devices, based on product ID, vendor ID, serial number and more. In addition, businesses can depend on the same to streamline file transfers, besides getting access to detailed control through both context and content inspection. Endpoint Protector keeps the USB storage devices completely safe with password protection. It even runs accurate scans through all the content, manually or automatically, in order to find any issues with the data that could be harmful. The software works on advanced technologies to quickly discover intellectual properties, like source code, present in hundreds of file formats. Endpoint Protector can even scan and safeguard Personally Identifiable Information (PII), including bank account numbers, credit card numbers and social security numbers. Ultimately, the software assures accurate protection against internal threats by conducting detailed scans across sensitive information, under its loss prevention feature.

Read more

Screenshots & Videos

Endpoint Protector screenshot
Video Thumbnail
Video Thumbnail

Pricing

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    97%
  • Reviews
    91%
  • Momentum
    69%
  • Popularity
    98%

Platforms Supported

  • Browser Based (Cloud)
  • Desktop App (Windows, Mac)

Organization Types Supported

  • All (Small, Medium, Large)

API Support

  • Available

Modes of Support

  • 24/7 (Live rep), Business Hours, Online

Endpoint Protector Features

Data Loss Prevention (DLP) Features

  • Features: The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    97%

Data Leak Detection

Helps to prevent and mitigate data leaks through endpoints

File Server Auditing

Records and reports all file accesses and modifications made to file servers in the real-time environment.

Data Backup

Facility to backup files to prevent accidental damage and loss of important data due to deletion.

Compliance Reporting

Helps in creating a compliance report to establish an effective and efficient policy and procedure management.

Blacklisting

The practice of blocking identified entities to access particular privilege and services

Whitelisting

The practice of allowing identified entities to access particular privilege and services

Sensitive Data Identification

Inspects the sensitive data (PII, PCI, PHI) in file contents and classifies the files, folders, and data based on vulnerability

Incident Management

Helps in identifying, analyzing and rectifying a bad incident or issues to ensure it does not reoccur in future

Policy Management

Helps to design, maintain, update and report on compliance rules, regulations and policy status electronically so that it is easily accessible

Threat Protection

This feature will defend the system and application from cyber threats

File Analysis

Helps to analyze and identity ROT (redundant, outdated, and trivial) files to perform disk optimization
Endpoint Protector Pricing

Free Trial

Not available

Pricing Options

Premium Plans ( Quotation Based )

Pricing Plans

Disclaimer: The pricing details were last updated on 30/07/2020 from the vendor website and may be different from actual. Please confirm with the vendor website before purchasing.

Learn more about Endpoint Protector Pricing

Endpoint Protector Alternatives

View All Endpoint Protector Alternatives

Endpoint Protector Reviews

User Rating

4.6/5 (Based on 131 Ratings)

Rating Distribution

  • Excellent

    66.4%
  • Very Good

    29.8%
  • Average

    1.5%
  • Poor

    0.8%
  • Terrible

    1.5%

User Sentiments

Cross-Platform Compatibility, Effective Device Control, Easy Deployment, Strong Data Loss Prevention

Outdated User Interface, Occasional Agent Issues, Limited Reporting Functionality, Complex Content-Aware Configuration

Do You Use Endpoint Protector?

Write a Review

Review Summary

Endpoint Protector is widely praised for its effectiveness in preventing data breaches and endpoint security incidents. Users appreciate its user-friendly interface, comprehensive features, and excellent customer support. However, some users have reported occasional technical glitches and connectivity issues. Overall, Endpoint Protector is highly recommended for businesses seeking robust endpoint protection and data security solutions.

Pros

  • Blocks advanced threats, including ransomware and zeroday attacks, in realtime.
  • Provides comprehensive endpoint protection with antimalware, firewall, and intrusion prevention features.
  • Easy to deploy and manage, with a centralized console for monitoring and reporting.
  • Excellent customer support with fast response times and knowledgeable representatives.

Cons

  • Can be expensive, especially for larger organizations with multiple endpoints.
  • Some users have reported slow performance and occasional system crashes.
  • Limited integration with other security tools, which can make it challenging to create a comprehensive security strategy.
  • Documentation could be improved to provide more detailed instructions and technical information.

Endpoint Protector Reviews

AI-Generated from the text of User Reviews

Videos on Endpoint Protector

Endpoint Protector Screenshots

Endpoint Protector FAQs

What is Endpoint Protector used for?

Endpoint Protector is Data Loss Prevention (DLP) Software. Endpoint Protector offers the following functionalities:

  • Data Leak Detection
  • File Server Auditing
  • Data Backup
  • Compliance Reporting
  • Blacklisting
  • Whitelisting
  • Sensitive Data Identification
  • Incident Management
  • Policy Management
  • Threat Protection

Learn more about Endpoint Protector features.

What are the top alternatives for Endpoint Protector?

Does Endpoint Protector provide API?

Yes, Endpoint Protector provides API.

Endpoint Protector Contact

Vendor Details

Cluj-Napoca, Romania

Contact Details

+40 264 593 110

https://www.endpointprotector.com/

Social Media Handles

Customers

Samsung
Toyota
Philips
Zeppelin
Western Union
ebay

Disclaimer

This research is curated from diverse authoritative sources; feel free to share your feedback at [email protected]

We understand SaaS better

SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

icon

Buyers

Looking for the right SaaS

We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

icon

Makers

Want more customers?

Our experts will research about your product and list it on SaaSworthy for FREE.

Get Listed